Re: [Nagios-devel] Re: [[email protected]: Re: CVE-2006-2162: Buffer overflow in nagios]

Support forum for Nagios Core, Nagios Plugins, NCPA, NRPE, NSCA, NDOUtils and more. Engage with the community of users including those using the open source solutions.
Locked
Guest

Re: [Nagios-devel] Re: [[email protected]: Re: CVE-2006-2162: Buffer overflow in nagios]

Post by Guest »

--UugvWAfsgieZRqgk
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

hey ethan,

On Thu, May 11, 2006 at 02:17:14PM -0500, Ethan Galstad wrote:
> If the packet is greater than INT_MAX in size, then yes, the integer=20
> would probably overflow and result in a negative size. The patch to the=
=20
> Nagios CGI handles negative values for the Content-Length, so unless I'm=
=20
> missing something, we should be okay. Someone please chime in if you=20
> believe otherwise.

try setting Content-Length to INT_MAX-1. because later:

if(!(cgiinput=3D(char *)malloc(content_length+1))){


sean

--UugvWAfsgieZRqgk
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFEZFoIynjLPm522B0RAhNrAKCIphj+hZFU64XdyeSIZ4hPONLZCQCfeOiS
Ktlvp4xlrNu6VkRN7wAam/U=
=RFva
-----END PGP SIGNATURE-----

--UugvWAfsgieZRqgk--





This post was automatically imported from historical nagios-devel mailing list archives
Original poster: [email protected]
Locked